The old adage “If it seems to be too good to be true, it probably is”. That is, it’s NOT true. Crowdsourcing companies promise a lot more than they can deliver. Our previous post proved to be way too optimistic when we tried to get a couple of those companies to actually deliver those views. What we found was that some proxy servers MIGHT do so.
However, it seems that proxy servers are as much of a bag of snakes as crowdsourcing entities. We noted during our experiments with crowdsourcing companies that some of them proposed to use proxy servers, or actually did so, but they apparently did not succeed in adding more than a handful of views. That apparently was because YouTube is too clever, and they disqualified most of the views for a variety of reasons. For example, if the crowdsource operative used a proxy server located in a country other than his/her own (which they could tell if the visiting IP was from one country in one time zone but the time of the computer to which the IP was attached was set to a different time zone), YouTube disqualified those views.
The other challenge is that most proxy server folks want to be paid in Bitcoin. While you can use dollars or credit cards or gift cards at sites like Paxful, they can be pretty expensive.
The bottom line is that many owners of YouTube channels may find it too expensive and time-consuming to boost their view counts via crowdsourcing or proxy servers.
Facebook and a handful of other social media are so entrenched that few people think about life before them. But the Web was conceived 15 years before Facebooks’s founding in 2004. Facebook put a pretty face on the Web, and billions of people have flocked to it. And Google Search, YouTube, and a handful of other giants –fueled by tons of advertising revenues—exercise a lot of control over what people can see and do, so much so that there is growing sentiment about breaking up these monopolistic organizations. And delivering fake news or vicious propaganda from the likes of ISIS (ironically ISIS can even get PAID by YouTube while it disseminates its messages of hatred) adds further pressure for this breakup.
We at Wild Bill Web Enterpises have been tracking the visitors (and other metrics) for our three websites–including TechnologyBloopers, WhyMenDieYoung, and Wilddancer—on a weekly basis using Google Analytics and on a monthly basis using our ISP for nearly two years, and are baffled by the helter-skelter, all-over-the-map, random-looking numbers Google Analytics is providing us. Apparently this is a common problem, with a lot of possible causes, including some possibilities that could be our fault (well, the lack of useful guidance from Google and other sources isn’t really OUR fault). And it isn’t that our visitor volume is so high that we are the victim of Google’s sampling process. But we, and probably millions of other website developers, find it highly difficult, even impossible, to make any decisions based on this data. Why don’t the Internet and the Web take advantage of the huge computing power of the hardware and software to provide reasonably accurate statistics so that we can make things easier and more productive for both us and our visitors?
Well, Google sure isn’t making it easy for individuals, thanks to the messy combinations of accounts, email addresses, channels, and browsers that makes it a nightmare to find videos once you have more than one of each of these four entities. And to make matters worse, Google threw its failing Google+ social network into the brew. Using Chrome we find three channels (or are these accounts?)—Wilddancer, Beekeeping (thus far empty as we try to sort out the whole mess), and Bill Coggshall—associated with one email address, and two channels—Car Tunes by Coggshall (which started out as “Car Tunes” that YouTube allowed me to reserve then reneged and forced me to add “by Coggshall”) and email@example.com (strange-looking channel, no?)– associated with a different email address (firstname.lastname@example.org). Using Firefox we find two channels (or accounts?)—Car Tunes by Coggshall and email@example.com—associated with email address firstname.lastname@example.org.
The Internet and the Worldwide Web have arguably changed the path of history. And they have made companies like Google into mega successes. But those companies have also caused much consternation among their millions of users. Why? Apparently they don’t bother to check with many (or any!) of those users to see how logical and self-evident their websites and associated tools are for their target audiences. Examples abound, and we will be posting some of the more egregious. But the Internet giants could have been even more successful, and keep website visitors on their sites longer (where they would be exposed to more advertisements) if their user interfaces were less opaque. The goal is usability, which is not rocket science. Two of most used tools are the Chrome browser and YouTube, which we will discuss in separate posts.
I was shopping for MEN’s pickpocket-proof travel pants, and I must have visited travelsmith.com in my search. That was on Monday, May 2. Now, on Wednesday, May 4, EVERY site I visit—on searches totally unrelated to clothing—I am dealt a Travelsmith WOMAN’S Walkabout Knit Short-Sleeved Drape-Neck Top. I hope that Travelsmith is not paying Google (I am using Chrome) or another ad-dealing company very much for these ads. What is their logic? Do they think that I want to buy my wife this top (admittedly, at $27 it IS a lot cheaper than the pants)? Fortunately, after repeating this advertisement ad nauseum, Google graciously offered to let me fine-tune my ad preferences. Hmmm.
But it’s already too late to put the sword back in its place. The Internet, the Worldwide Web, Google Search, social networks, and other on-line miracles have given billions of people capabilities they never had dreamed of. But in their haste the makers of these tools have also enabled evil-doers capabilities beyond the masses’ worst nightmares. History is full of other technological advances that have been used for both good and evil purposes, but more recently cyberattacks have permitted individuals or small groups, sitting in safety at their personal computing devices, to wreak havoc on millions of innocent victims. These cyberattacks appear to be increasing in frequency and scope of havoc. Most recently several news sources reported the charging of an Iranian hacker on March 24 of his 2013 attack on a dam in Rye Brook, NY, which he found vulnerable using a technique called Google Dorking. (The wheels of justice certainly turn slowly … especially compared with the speed of computers and their hacker masters!)
Apparently he did not use his knowledge to operate the sluice gate of this small dam (perhaps because it was disconnected from computer control at the time). And although this dam is in a rather backwater community (pun intended) and not much of a threat to national security or even significant injury to people or damage to property, the ability of the hacker to infiltrate the computer system demonstrates a capability to attack a much bigger and more dangerous dam or other strategic infrastructure such as an electric power grid.
The really scary thing is that almost certainly many other sectors are under similar attacks. One such sector is hospitals. Within the last two months the computer systems at the Hollywood Presbyterian Medical Center, the Methodist Hospital in Henderson, KY, and the MedStar Georgetown University Hospital in Washington, DC were crippled by cyberattacks. These were not minor incidents; the overall MedStar 10-hospital group has 30,000 staff and 6,000 affiliated doctors. And patients in critical condition could die from the delays caused by inoperative computer systems.
Another sector is financial. On March 29 hackers breached the security at two large law firms whose giant Wall Street banks and corporate clients are constantly dealing with confidential matters, knowledge of which could net hackers millions of dollars through insider trading.
The general populace can only hope that the responsible governmental agencies are working hard to identify strategic facilities throughout the U.S. and its allies, and alert vulnerable ones so they can take steps to minimize the dangers from Google Dorking and other hacker nastiness. And also hope that “white hat hackers” (the good guys)–the modern-day equivalent of yesteryears’ vigilantes—step up their activities. It would help considerably if these strategic facilities would reward these hackers for their efforts.
“The Lord Giveth and the Lord Taketh Away” is a truly flexible and useful concept. We can replace “Lord” by such notions as “Technology” or “Internet” or “Mobile Devices” or a whole host of other products and services. And those products and services can be used to teach us, to inform us, to entertain us, etc. How valuable they are depends on the objectives of the individual or group in question. We’d guess that a large fraction of the folks who read the New York Times either work pretty hard or respect others who do work pretty hard. On the other hand those who spend a lot of time looking at or posting to Tumblr probably are at the other end of the spectrum, as Tumblr itself serves up such suggestions as “5 ways to waste the rest of the day” (by the way, you can find lots of OTHER folks using that phrase when you surf) and counsels its members that “work can wait”, presumably while you read or write posts on Tumblr.
To put this in perspective we took a look at how Americans spent their day in 2014, thanks to some detailed data from the Bureau of Labor Statistics (BLS). Of the 24.00 hours in a day, we spend 10.75 hours taking care of basic needs (sleeping, other personal care, and eating and drinking), 3.59 hours working or doing work-related activities, a meager 0.42 hours being educated (a low average because the majority of Americans are not enrolled in educational institutions), a whopping 5.30 hours on leisure and sports (which includes 2.82 hours watching television), and a modest 0.14 hours communicating (telephone, email, and snailmail).
But even the most casual observer would likely object to the low communicating figure from the BLS because everywhere you look people are peering into their smartphones. One study found that smartphone users spend two hours each day using those devices. And what are they doing with those phones? It depends on whose statistics you believe, but it is interesting to note that it’s not all entertainment. And it is even more interesting to realize that a smartphone enables its user to seamlessly shift between work-related and personal activities, so they aren’t all just wasting the rest of the day a la Tumblr. Whew, the American economy may not be in danger!
Did Stephanie Lenz make a bag of money from her video that Universal would otherwise have made? It seems that actually Universal and Prince got a lot of free advertising out of it starting in 2007, no? A U.S. Circuit Court of Appeal has just struck a blow against the hubris of music publishers such as Universal who send out takedown notices at the drop of a hat. If every YouTube (or Vimeo et al) video that borrowed a little, or even a lot, triggered so much legal argy-bargy, there wouldn’t be enough lawyers and judges on the planet to deal with it all. Similarly for the print world, and look at all the examples of “the pot calling the kettle black”:
-Google violated copyrights wholesale by scanning millions of books; but didn’t that provide a service to humanity by making intellectual content available for out-of-print volumes?
-Facebook was essentially a college Freshman Register; could it have been sued by thousands of universities collectively?
-Amazon’s Kindle refuses to let owners copy even one word. So all students writing term papers are back to the archaic 3×5 cards in the digital age. How stupid can they be, especially in the days of the Turnitin plagiarism checker technology?